Author of the publication

A RBAC Model Based on Multi-granularities of Time Constraints.

, , , , and . ICAIC (4), volume 227 of Communications in Computer and Information Science, page 538-549. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A blockchain-based access control protocol for secure resource sharing with mobile edge-cloud collaboration., , , , , and . J. Ambient Intell. Humaniz. Comput., 14 (10): 13661-13672 (October 2023)Stealthy and Flexible Trojan in Deep Learning Framework., , , , , and . IEEE Trans. Dependable Secur. Comput., 20 (3): 1789-1798 (May 2023)Software Misconfiguration Troubleshooting Based on State Analysis., , , , , and . DSC, page 361-366. IEEE, (2021)Building Covert Timing Channel of the IoT-Enabled MTS Based on Multi-Stage Verification., , , , and . IEEE Trans. Intell. Transp. Syst., 24 (2): 2578-2595 (February 2023)An Improved Multi-agent Approach for Solving Large Traveling Salesman Problem., , , , and . PRIMA, volume 4088 of Lecture Notes in Computer Science, page 351-361. Springer, (2006)Energy Aware Data Layout for De-duplication System., , , , , and . PDCAT, page 511-516. IEEE, (2012)Research on Bluetooth protocols based on Android kernel log., , , , and . Int. J. Comput. Sci. Math., 6 (1): 78-87 (2015)A VirtualXposed-Based Inline Hooking Framework for Android Native Methods., , , , , and . SocialSec, volume 1298 of Communications in Computer and Information Science, page 245-253. Springer, (2020)Tracing Android Kernel Codes at Early Stage without Extra Hardware Components., , , , and . DSC, page 210-216. IEEE, (2019)A feature-vector generative adversarial network for evading PDF malware classifiers., , , , and . Inf. Sci., (2020)